Encrypting the data ensures that confidentiality is protected even when the operating system is not running. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, thereby circumventing operating system controls. If data at rest is unencrypted, it is vulnerable to disclosure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |